Doowon Kim
Title
Cited by
Cited by
Year
You get where you're looking for: The impact of information sources on code security
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
2016 IEEE Symposium on Security and Privacy (SP), 289-305, 2016
1882016
Comparing the usability of cryptographic apis
Y Acar, M Backes, S Fahl, S Garfinkel, D Kim, ML Mazurek, C Stransky
2017 IEEE Symposium on Security and Privacy (SP), 154-171, 2017
1532017
An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems.
W Bai, D Kim, M Namara, Y Qian, PG Kelley, ML Mazurek
SOUPS, 113-130, 2016
472016
Certified malware: Measuring breaches of trust in the windows code-signing pki
D Kim, BJ Kwon, T Dumitraş
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications†…, 2017
412017
How internet resources might be helping you develop faster but less securely
Y Acar, M Backes, S Fahl, D Kim, ML Mazurek, C Stransky
IEEE Security & Privacy 15 (2), 50-60, 2017
222017
Lessons learned from using an online platform to conduct large-scale, online controlled security experiments with software developers
C Stransky, Y Acar, DC Nguyen, D Wermke, D Kim, EM Redmiles, ...
10th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 17), 2017
192017
Balancing security and usability in encrypted email
W Bai, D Kim, M Namara, Y Qian, PG Kelley, ML Mazurek
IEEE Internet Computing 21 (3), 30-38, 2017
172017
Issued for abuse: Measuring the underground trade in code signing certificate
K KozŠk, BJ Kwon, D Kim, T Dumitraş
arXiv preprint arXiv:1803.02931, 2018
142018
A survey of balloon networking applications and technologies
D Kim
2013-12-20)[2014-05-20]. www. cse. wustl. edu/~ jain/cse570-13/ftp/BalloonN†…, 2013
132013
The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing {PKI}
D Kim, BJ Kwon, K KozŠk, C Gates, T Dumitraș
27th {USENIX} Security Symposium ({USENIX} Security 18), 851-868, 2018
112018
Implementation of framework to identify potential phishing websites
D Kim, C Achan, J Baek, PS Fisher
2013 IEEE International Conference on Intelligence and Security Informatics†…, 2013
42013
fFTP: a fast file transfer protocol for home N-screen platform
D Kim, J Baek, PS Fisher, S Kim
Personal and Ubiquitous Computing 22 (1), 143-152, 2018
32018
An Adaptive Primary Path Switching Scheme for Seamless mSCTP Handover
J Baek, D Kim, PS Fisher, M Jo
SmartCR 1 (2), 150-160, 2011
22011
An Inconvenient Trust
W Bai, M Namara, Y Qian, PG Kelley, ML Mazurek, D Kim
User Attitudes toward Security and Usability Tradeoffs for Key-Directory†…, 2016
12016
Understanding of Adversary Behavior and Security Threats in Public Key Infrastructures
D Kim
2020
Poster: Analysis of Reused Private Keys in the Code Signing PKI
Doowon Kim, S. Gokberk Karaca, Tudor Dumitras
The Network and Distributed System Security Symposium 2019, 2019
2019
Rigor in Experimentation
G Voelker, M Sherr, R Groz, A Doupť, L Mounier, D McCoy, G Stringhini, ...
10th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 17), 2017
2017
Insights into Malware Distribution with Graph Analytics
M Gao, D Kim, T Li, V Srinivas
2016
Analyzing privacy leakage from used electronic devices in secondhand market
SE Banafati, J Ghurye, K Lee, D Kim
The system can't perform the operation now. Try again later.
Articles 1–19